共 21 条
- [1] Ahmad A.M., Ismail S., Samaon D.F., Recurrent neural network with backpropagation through time for speech recognition, IEEE International Symposium on Communications & Information Technology, (2004)
- [2] Amini A., Tabrizi J.S., Farahsa S., 45: Developing an audit model for evaluating educational departments, BMJ Open, 7, pp. 17-18, (2017)
- [3] Anjaria K., Mishra A., Relating Wiener's cybernetics aspects and a situation awareness model implementation for information security risk management, Kybernetes, 47, 1, pp. 58-79, (2017)
- [4] Bass T., Intrusion detection systems and multisensor data fusion, Communications of the ACM, 43, 4, pp. 99-105, (2000)
- [5] Gan W-D., Cheng Z., Bo S., Network security situation prediction model based on RAN-RBF neural network, Computer Science, (2016)
- [6] Genge B., Et al., Designing optimal and resilient intrusion detection architectures for smart grids, IEEE Transactions on Smart Grid, 8, 5, pp. 2440-2451, (2017)
- [7] Gomez-Pilar J., Et al., Quantification of graph complexity based on the edge weight distribution balance: Application to brain networks, International Journal of Neural Systems, 28, 1, (2018)
- [8] Hochreiter S., Schmidhuber J., Long short-term memory, Neural Computation, 9, 8, pp. 1735-1780, (1997)
- [9] Jiang Y., Et al., On network security situation prediction based on RBF neural network, 2017 36th Chinese Control Conference (CCC), (2017)
- [10] Kang J., Park J.H., A secure-coding and vulnerability check system based on smart-fuzzing and exploit, Neurocomputing, 256, 20, pp. 23-34, (2017)